Total Tayangan Halaman

Senin, 27 Maret 2017

Pentagon seeks a few good computer hackers to test security

In this Jan. 28, 2016 file photo, Defense Secretary Ash Carter gestures during a news conference at the Pentagon. The Pentagon is looking for a few good computer hackers. Screened high-tech specialists will be brought in to try to breach the Defense Department's public Internet pages in a pilot program aimed at finding and fixing cybersecurity vulnerabilities. (AP/Cliff Owen)


The Pentagon is looking for a few good computer hackers.

Screened high-tech specialists will be brought in to try to breach the Defense Department's public Internet pages in a pilot program aimed at finding and fixing cybersecurity vulnerabilities.

According to the Pentagon, it is the first time the federal government has undertaken a program with outsiders attempting to breach the networks. Large companies have done similar things.

Defense officials laid out the broad outlines of the plan Wednesday, but had few details on how it will work, what Pentagon systems would be tested and how the hackers would be compensated.

Called "Hack the Pentagon," the program will begin next month. Department officials and lawyers still must work through a number of legal issues involving the authorization of so-called "white-hat hackers" to breach active Pentagon websites.

Defense Secretary Ash Carter said he will be "inviting responsible hackers to test our cybersecurity," adding that he believes the program will "strengthen our digital defenses and ultimately enhance our national security."

Speaking at a tech industry event in San Francisco, Carter said the idea came from Silicon Valley, where tech companies offer financial rewards or bounties for finding vulnerabilities.
"We're trying to adopt what is a best practice," he said. "It's a way of crowdsourcing the expertise and having access to good people. ... You'd much rather find the vulnerabilities in your networks in that way" — rather than wait for malicious hackers to steal information or compromise a system.

Defense Department systems get probed and attacked millions of times a day, officials say.
The new program is being led by the Defense Digital Service, which was created by Carter last November.

Officials said the pilot program will involve public networks or websites that do not have any sensitive information or personal employee data on them.

It is being called a "bounty" program and Carter said the hackers would get some kind of reward, beyond the distinction of having beached the world's greatest military's systems. But he didn't provide details. 
___
AP Technology Writer Brandon Bailey in San Francisco contributed to this report.

Cr. Jakarta Post 

Analysis :
  • Present Continous Tense :
  1. Department officials and lawyers still must work through a number of legal issues involving the authorization of so-called "white-hat hackers" to breach active Pentagon websites.
  • Simple Present Tense :
  1. Defense Department systems get probed and attacked millions of times a day, officials say.
  • Present Future Tense :

  1. Called "Hack the Pentagon," the program will begin next month
  2. Defense officials laid out the broad outlines of the plan Wednesday
  3. He believes the program will "strengthen our digital defenses and ultimately enhance our national security."
  4. Screened high-tech specialists will be brought in to try to breach the Defense Department's public Internet pages in a pilot program aimed at finding and fixing cybersecurity vulnerabilities.
  5. Defense Secretary Ash Carter said he will be "inviting responsible hackers to test our cybersecurity,"

  • Simple Past Tense :

  1. The new program is being led by the Defense Digital Service, which was created by Carter last November.
  2. Speaking at a tech industry event in San Francisco, Carter said the idea came from Silicon Valley.
  • Present Perfect Tense :

  1. Defense Department systems get probed and attacked millions of times a day, officials say. 

  • Reguler Verb :
  1. Screened
  2. Aimed
  3. Tested
  4. Compensated
  5. Called
  6. Probed
  7. Attacked
  8. Created
  9. Beached
  • Irreguler Verb :

  1. Brought
  2. Work
  3. Led
  • Gerund :
  1. Breach the Defense Department's public Internet pages in a pilot program aimed at finding and fixing cybersecurity vulnerabilities.
  2. According to the Pentagon
  3. It is the first time the federal government has undertaken a program with outsiders attempting to breach the networks.
  4. Lawyers still must work through a number of legal issues involving the authorization of so-called "white-hat hackers"
  5. "inviting responsible hackers to test our cybersecurity,"
  6. Speaking at a tech industry event in San Francisco
  7. Beyond the distinction of having beached the world's greatest military's systems.
  8. "We're trying to adopt what is a best practice,"

  • Infinitive :

  1. According to the Pentagon
  2. Will be brought in to try to breach..
  3. Called "white-hat hackers" to breach active Pentagon websites.
  4. “inviting responsible hackers to test our cybersecurity,"
  5. "We're trying to adopt what is a best practice,"
  6. Rather than wait for malicious hackers to steal information or compromise a system.

Peran IT Dalam Dunia FinTech (Financial Technology)

Peran IT Dalam Dunia FinTech (Financial Technology) Pengertian Financial Technology              Pengertian finansial  da...